Showing 421 - 440 results of 19,511 for search '"algorithms"', query time: 0.07s Refine Results
  1. 421

    Fusion spectrum sensing algorithm based on eigenvalues by Wenjing ZHAO, He LI, Minglu JIN

    Published 2019-11-01
    “…Aiming at the problem of inefficient use of spectrum resources,a fusion spectrum sensing algorithm based on eigenvalues was proposed to effectively achieve dynamic spectrum sharing.The test statistics were constructed by employing the maximum eigenvalue,the trace and the geometric mean of all eigenvalues of the sample covariance matrix.The detection probability and false alarm probability of the proposed method were analyzed using the random matrix theory,and the analytical representation of the theoretical threshold was obtained.In addition,the parameter selection of the proposed algorithm was analyzed theoretically.Simulation results show that the proposed algorithm has better detection ability than the existing eigenvalue detection algorithm.…”
    Get full text
    Article
  2. 422

    Hybrid genetic algorithm based optimization of pilotpattern by Hanbing ZHENG, Xiang YU, Weiwei WANG

    Published 2016-09-01
    “…In OFDM system,sparse channel estimation based on compressed sensing(CS)can make full use of the inherent sparse degree of the wireless channel,which can reduce the pilot overhead and improve the spectrum efficiency.Therefore,a new method based on hybrid genetic algorithm was investigated for the pilot design of CS channel estimation,which was based on the minimization of the matrix cross correlation in the CS theory.In this method,genetic algorithm was used to obtain the initial sub-optimal pilot sequence,and then combined with the pilot position and pilot power,each entry of pilot pattern could be sequentially updated and optimized to make the minimum correlation of measurement matrix.Simulation results show that the proposed method can ensure a better mean square error and bit error rate compared to the pseudo-random pilot design and the equal distance pilot design.…”
    Get full text
    Article
  3. 423
  4. 424

    Video watermarking algorithm for resisting collusion attacks by LIU Shao-hui, HAN Lu, YAO Hong-xun

    Published 2010-01-01
    “…A content dependent video watermark algorithm for resisting linear collusion attacks was presented. …”
    Get full text
    Article
  5. 425
  6. 426

    An optimization coverage algorithm with controllable dynamic parameters by Chuan LI, Xuejun LI

    Published 2016-11-01
    “…The energy consumption and coverage is a fundamental problem in the field of wireless sensor networks,which is also a priority issue.Based on the isomorphism of the sensor nodes,an optimized coverage algorithm with controllable dynamic parameters(OCCDP)was presented.Firstly,it gave the solution of the largest seamless coverage probability under the joint coverage of three nodes.Secondly,it gave the solving method of the sensor nodes coverage quality expectation in monitoring area and compares to neighbor nodes coverage probability determination method.When there was a redundant coverage,it gave the process of calculation of coverage probability when any sensor node was in the condition of redundant nodes coverage.Finally,through the comparison of the simulation with other algorithms in terms of the coverage quality and the network lifetime,it can be concluded that the average performance can upgrad to 11.02% and 13.27%,which proves the effectiveness and feasibility of the algorithm.…”
    Get full text
    Article
  7. 427

    An Improved Multiobjective Algorithm: DNSGA2-PSA by Dan Qu, Xianfeng Ding, Hongmei Wang

    Published 2018-01-01
    “…To improve the diversity and decrease execution time of the nondominated sorting genetic algorithm II (NSGA-II), an improved algorithm is presented in this paper, which adopts a new vector ranking scheme to decrease the whole runtime and utilize Part and Select Algorithm (PSA) to maintain the diversity. …”
    Get full text
    Article
  8. 428
  9. 429

    An optimized routing algorithm in WSN for smart park by Wei DING, Shuquan LI, Siwei LI, Liangrui TANG, Dandan SUN

    Published 2016-03-01
    “…To solve the energy problem in wireless sensor networks used for smart park,an optimized routing algorithm based on routing cost in WSN was proposed.According to the characteristics of smart park,the algorithm took a comprehensive consideration of the remaining energy and geographical location of nodes and exploited a new routing cost function.The sensor nodes selected the node with the minimum routing cost to forward the packets.Simulation results show that the algorithm significantly reduces the energy consumption of the network and extends the network lifetime effectively.…”
    Get full text
    Article
  10. 430

    Scalable overlay multicast algorithm with high stability by Ye SHEN, Jing FENG, Zhan-feng WANG

    Published 2016-05-01
    “…A new scalable overlay multicast algorithm with high stability(SOM-HS)was proposed.In SOM-HS algo-rithm,the node stability and the link weight factor were defined to ensure that the high stability nodes were located in the backbone network of multicast tree.In the hierarchica clustering configuration process,SOM-HS algorithm limits the degree of the nodes to ensure load balancing.The experimental results show that,the maximum delay with SOM-HS al-gorithm is minimum compared to the other existing algorithms in different multicast scales.…”
    Get full text
    Article
  11. 431

    Shot boundary detection algorithm based on ORB by Jiang-qi TANG, Lin-jiang XIE, Qing-sheng YUAN, Dong-ming ZHANG, Xiu-guo BAO, Wei Guo

    Published 2013-11-01
    “…The existing algorithms of SBD show low robustness when there exist camera or object movements, light changes in the scene. …”
    Get full text
    Article
  12. 432

    Analysis and Algorithmic Generation of Hepatic Vascular Systems by Lars Ole Schwen, Tobias Preusser

    Published 2012-01-01
    “…Results of the existing “Constrained Constructive Optimization” algorithm are compared to real vascular tree data. …”
    Get full text
    Article
  13. 433

    Fast algorithm and architecture for embedded block coding by XIONG Cheng-yi1, HOU Jian-hua1, TIAN Jin-wen1, LIU Jian1

    Published 2006-01-01
    “…By using this BPC algorithm, the coefficients bit modeling for all bit planes in a code block were completed as parallel and sequential mode by one scan. …”
    Get full text
    Article
  14. 434

    An Automatic Image Inpainting Algorithm Based on FCM by Jiansheng Liu, Hui Liu, Shangping Qiao, Guangxue Yue

    Published 2014-01-01
    “…Aiming at this drawback of the traditional image inpainting algorithms, this paper proposes an automatic image inpainting algorithm which automatically identifies the repaired area by fuzzy C-mean (FCM) algorithm. …”
    Get full text
    Article
  15. 435
  16. 436

    Embedding of national cryptographic algorithm in Hyperledger Fabric by Qi CAO, Shuhua RUAN, Xingshu CHEN, Xiao LAN, Hongxia ZHANG, Hongjian JIN

    Published 2021-02-01
    “…Hyperledger Fabric is an extensible alliance blockchain platform and provides support for enterprise-level commercial blockchain projects.The cryptographic algorithm is the core technologies of the platform, ensuring the security and non-tampering of the data on the chain.But the original Fabric platform lacks the national cryptographic algorithm support.The embedding and support of the national cryptographic algorithm of the Fabric platform was designed and implemented.Firstly, the interaction logic of between components and the invocation scenario of each type of cryptographic algorithm in the Fabric platform were analyzed, an idea of embedding national cryptographic algorithm support for the platform was proposed.Secondly, the modules and interfaces for SM2, SM3 and SM4 were added to BCCSP of the Fabric platform based on the open source code of national cryptographic algorithm implementation.Thirdly, the interface of cryptographic algorithm invoked by the upper layer of each component is associated to the interface of corresponding national cryptographic algorithms, which realized the invocation support of national cryptographic algorithm for the upper layer applications.Finally, the correctness and effectiveness of the embedded national cryptographic algorithm were verified by creating a fabric-gm test instance.And compared with the performances of the test instance built by the mirror of the native Fabric platform.The experimental results show that the embedded national cryptographic algorithm interfaces are corrected and the generated national cryptographic certificates are effective.Moreover, compared with the native Fabric platform, the network start up time increases by about 3%.In the millisecond unit, the transaction time cost increases by about one time, the dynamic certificate generation time increases by about 9%, and all the performance are within the acceptable range.…”
    Get full text
    Article
  17. 437

    Cloud scheduling algorithm based on fuzzy clustering by Wen-juan LI, Qi-fei ZHANG, Ling-di PING, Xue-zeng PAN

    Published 2012-03-01
    “…In order to better serve cloud’s objective of providing low-cost and on-demand services,a two-level and fuzzy clustering based cloud scheduling algorithm named FCTLBS(fuzzy clustering and two level based task scheduling algorithm) was proposed.Scheduling was divided into two levels:user scheduling and task cheduling.It used fuzzy clustering method to cluster resources according to their capabilities and computed tasks’resource bias coefficient according to their parameters.Thus tasks with different resource preference were able to choose different capability resources in the corresponding clusters.The new algorithm reduces the scale of resource choice,better reflects cloud tasks’ service requirements.Simulation results show that the proposed algorithm has some advantages compared to other kindred algorithms.…”
    Get full text
    Article
  18. 438

    RTRS algorithm in low-power Internet of things by Yuchen CHEN, Yuan CAO, Laipeng ZHANG, Lianghui DING, Feng YANG

    Published 2019-12-01
    “…Considering the feature of periodical uplink data transmission in IEEE 802.11ah low-power wide area network (LWPAN),a real-time RAW setting (RTRS) algorithm was proposed.Multiple node send data to an access point (AP),and the uplink channel resources were divided into Beacon periods in time.During a Beacon period,AP firstly predicted the next data uploading time and the total amount of devices that will upload data in the next Beacon period.The AP calculated the optimal RAW parameters for minimum energy cost and broadcasted the information to all node.Then all devices upload data according to the RAW scheduling.The simulation results show that the current network state can be predicted accurately according to the upload time of the terminal in the last period.According to the predicted state,raw configuration parameters can be dynamically adjusted and the energy efficiency can be significantly improved.…”
    Get full text
    Article
  19. 439

    Design of Structure and Control Algorithm for Solar Tracker by Huo Xiangru, Hou Li, Wei Yongqiao, Luo Lan, Zhang Qi

    Published 2017-01-01
    “…Finally,the results of the experiments show that the structure design scheme and the tracking algorithm are of great significance for improving the utilization of solar energy.…”
    Get full text
    Article
  20. 440

    EFH:an online unsupervised hash learning algorithm by Zhenyu SHOU, Jiangbo QIAN, Yihong DONG, Huahui CHEN

    Published 2020-03-01
    “…Many unsupervised learning to hash algorithm needs to load all data to memory in the training phase,which will occupy a large memory space and cannot be applied to streaming data.An unsupervised online learning to hash algorithm called evolutionary forest hash (EFH) was proposed.In a large-scale data retrieval scenario,the improved evolution tree can be used to learn the spatial topology of the data.A path coding strategy was proposed to map leaf nodes to similarity-preserved binary code.To further improve the querying performance,ensemble learning was combined,and an online evolving forest hashing method was proposed based on the evolving trees.Finally,the feasibility of this method was proved by experiments on two widely used data sets.…”
    Get full text
    Article